Customer payment details stolen in JM Bullion hack

Malicious code was embedded on the site for six months and captured personal and payment information

Hackers scraped the personal information and payment details of customers who made purchases with the precious metals dealer JM Bullion in a cyber attack which lasted six months earlier this year.

JM Bullion discovered in July that malicious code had been embedded into its online shopping platform, enabling hackers to capture the information that customers entered when making a purchase. 

The code was present on the website from 18 February 2020 until it was removed months later on 17 July following a forensic investigation, before JM Bullion then approached law enforcement. Customers who made a payment during this window, and therefore may have been affected, were only notified this week their information may have been compromised. 

The information that may have been stolen includes name and address, as well as payment card details including account number, card expiration date and the security code required to make purchases. This, combined with the nature of the precious metals and items that JM Bullion sells, means the scope of financial loss is huge.

“JM Bullion takes the security of personal information in its care very seriously,” said the company’s CEO Michael Wittmeyer in a letter addressed to affected customers. “In response to this incident, JM Bullion notified law enforcement, our card processor, and the credit card brands, and continues to work with them as needed. 

“We also reviewed our internal procedures and implemented additional safeguards on our website to protect customer information in our possession.”

Because of the nature of the platform, the attack is likely to have affected many investors. This kind of cyber attack is very serious, according to digital privacy expert at ProPrivacy, Ray Walsh, because the information taken can potentially be used to defraud the victims.

“It is incredibly unusual that one of the world’s largest retailers of precious metals should suffer a cyber attack that goes unnoticed for five months, and this is extremely concerning,” Walsh said.

“There is a serious risk that this data may have been sold on the dark web, which means that the investors involved could be facing an ever-growing risk of fraud. For this reason, they must act quickly to cancel their card and secure their accounts as quickly as possible.”

Speculation is rife that Magecart is behind the JM Bullion attack, given the fact this incident resembles the notorious group’s modus operandi. While this hasn’t been confirmed, the consortium is known to target online shopping cart systems, normally powered by Magento, by substituting a piece of Javascript code into the targeted platform.

These attacks are incredibly frequent, and only in September the ‘largest ever’ Magecart hack compromised 2,000 online stores in one fell swoop. Hackers, according to Sansec, attacked 1.904 individual stores supported with an out-of-date Magento 1 platform in an automated campaign.

Featured Resources

Defeating ransomware with unified security from WatchGuard

How SMBs can defend against the onslaught of ransomware attacks

Free download

The IT expert’s guide to AI and content management

How artificial intelligence and machine learning could be critical to your business

Free download

The path to CX excellence

Four stages to thrive in the experience economy

Free download

Becoming an experience-based business

Your blueprint for a strong digital foundation

Free download

Recommended

Dual citizen sentenced to 11 years for role in North Korean crypto hacking scheme
hacking

Dual citizen sentenced to 11 years for role in North Korean crypto hacking scheme

10 Sep 2021
IoT devices are more vulnerable than ever
Internet of Things (IoT)

IoT devices are more vulnerable than ever

10 Sep 2021
DOJ extradites Ukrainian man who used a botnet to decrypt login credentials
botnets

DOJ extradites Ukrainian man who used a botnet to decrypt login credentials

9 Sep 2021
Hackers use open source tools to steal usernames and passwords
open source

Hackers use open source tools to steal usernames and passwords

8 Sep 2021

Most Popular

What are the pros and cons of AI?
machine learning

What are the pros and cons of AI?

8 Sep 2021
Apple patches zero-day flaw abused by infamous NSO exploit
exploits

Apple patches zero-day flaw abused by infamous NSO exploit

14 Sep 2021
Google takes down map showing homes of 111,000 Guntrader customers
data breaches

Google takes down map showing homes of 111,000 Guntrader customers

2 Sep 2021